Data security may only be a part of IT security, but even when concentrating of the security of data, the list of available tools is at least as long as the list of possible dangers.
Within this introductory workshop we will discuss topics starting from social engineering, come to possibly good and not so good password practices, will mention just a bit of the concept of public/private key encryption, before you will learn how to use some of the more common tools using these methods, including password managers, gpg, VPN, email signatures and encryption, and last but not least, your browser.
Due to the large zoo of tools, it is likely that we do not cover your tools of choice. However, we will focus on those aspects that are similar across different products.
Kompetenzzentrum Digitale Forschung (zedif)